You are on page 1of 237

https://www.examveda.

com/commerce/practice-mcq-question-on-ecommerce/

section1

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

1.

The dimension of e-commerce that enables commerce across national


boundaries is called _______.

A. interactivity

B. global reach

C. richness

D. ubiquity

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option B
Solution:
The dimension of e-commerce that enables commerce across national boundaries is called global
reach. Global Reach refers to a business initiative to increase the access between a company and
their current and potential customers through the use of the Internet.

2.

Which of the following describes e‐commerce?

A. Doing business electronically

B. Doing business

C. Sale of goods

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Doing business electronically describes e‐commerce. E-commerce (EC), an abbreviation for
electronic commerce, is the buying and selling of goods and services, or the transmitting of funds or
data, over an electronic network, primarily the internet.

3.

Which one of the following is not one of the major types of e-


commerce?

A. C2B

B. B2C

C. B2B

D. C2C
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
C2B is not one of the major types of e-commerce. The C2B, or consumer-to-business model, is
when customers offer products or services to businesses.

4.

Which of the following is part of the four main types for e‐commerce?

A. B2B

B. B2C

C. C2B

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
B2B, B2C and C2B is part of the four main types for e‐commerce.

5.

Which of the following is not considered to be one of the three phases


of e-commerce?

A. Innovation

B. Consolidation

C. Preservation
D. Reinvention

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Preservation is not considered to be one of the three phases of e-commerce. The act of keeping
something the same or of preventing it from being damaged is basically preservation.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

6.

Which segment do eBay, Amazon.com belong?

A. B2Bs

B. B2Cs

C. C2Bs

D. C2Cs

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
eBay, Amazon.com belong to B2Cs segments. The term business-to-consumer (B2C) refers to the
process of selling products and services directly between consumers who are the end-users of its
products or services.

7.

The idealistic market envisioned at the outset of the development of e-


commerce is called a ______.

A. Bailey market

B. Baxter market

C. Bergman market

D. Bertrand market
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The idealistic market envisioned at the outset of the development of e-commerce is called a
Bertrand market.

8.

Which type of e‐commerce focuses on consumers dealing with each


other?

A. B2B

B. B2C

C. C2B

D. C2C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
C2C type of e‐commerce focuses on consumers dealing with each other. Consumer to consumer,
or C2C, is the business model that facilitates commerce between private individuals. Whether it's
for goods or services, this category of e-commerce connects people to do business with one
another.

9.

The primary source of financing during the early years of e-commerce


was _______.

A. bank loans

B. large retail firms


C. venture capital funds

D. initial public offerings

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The primary source of financing during the early years of e-commerce was venture capital funds.
Venture Capital is money invested in businesses that are small; or exist only as an initiative, but
have huge potential to grow. The people who invest this money are called venture capitalists (VCs).
The venture capital investment is made when a venture capitalist buys shares of such a company
and becomes a financial partner in the business.

10.

Which segment is eBay an example?

A. B2B

B. C2B

C. C2C

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Ebay Stores allows you to set up an online store that sells products at a set price, instead of
allowing people to bid in auction format. This business model is preferred by many eBay
entrepreneurs because they can determine how much profit each product they sell will make.

1234567891011121314

Read More Section(Ecommerce)


Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

11.

All of the following are technologies used to gather information about


you online except ______.

A. spy ware

B. cookies
C. Gmail

D. anonymizers

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are technologies used to gather information about you online except
anonymizers. An anonymizer or an anonymous proxy is a tool that attempts to make activity on the
Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield
between a client computer and the rest of the Internet.

12.

In which website Global Easy Buy is facilitated?

A. Ebay.com

B. Amazon.com

C. Yepme.com

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
In Ebay.com Global Easy Buy is facilitated.

13.

A _________ is the set of planned activities designed to result in a profit


in a marketplace.

A. business model
B. profit model

C. business plan

D. revenue model

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A business model is the set of planned activities designed to result in a profit in a marketplace.

14.

The best products to sell in B2C e‐commerce are:

A. Small products

B. Digital products

C. Specialty products

D. Fresh products

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The best products to sell in B2C e‐commerce are Digital products. A digital product is an intangible
asset or piece of media that can be sold and distributed repeatedly online without the need to
replenish inventory.

15.

Which of the following is not a key element of a business model?

A. value proposition
B. competitive advantage

C. market strategy

D. universal standards

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Universal standards is not a key element of a business model.
8 Key Elements of a business model and types of E commerce Business models are
1) Value Proposition.
2) Revenue Model.
3) Market Opportunity.
4) Competitive Environment.
5) Competitive Advantage.
6) Market Strategy.
7) Organizational Development.
8) Management Team.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

16.

Which products are people most likely to be more uncomfortable


buying on the Internet?

A. Books

B. Furniture

C. Movies

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The products that people are most likely to be more uncomfortable buying on the Internet are
Furniture among the given options.

17.

The source of revenue in a subscription revenue model is __________.


A. Fees from advertisers in exchange for advertisements

B. Fees for business referrals

C. Fees from subscribers in exchange for access to content or services

D. Fees for enabling or execution a transaction

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The source of revenue in a subscription revenue model is Fees from subscribers in exchange for
access to content or services. The subscription business model is a business model in which a
customer must pay a recurring price at regular intervals for access to a product or service.

18.

Which products are people most likely to be comfortable buying on the


Internet?

A. Books

B. PCs

C. CDs

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The products that people are most likely to be more uncomfortable buying on the Internet are
Books, PCs and CDs.
19.

Which of the following is an example of a portal?

A. Amazon

B. eBay

C. Yahoo

D. Face book

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Yahoo is an example of a portal. Yahoo! is an Internet portal that incorporates a search engine and
a directory of World Wide Web sites organized in a hierarchy of topic categories.

20.

Digital products are best suited for B2C e‐commerce because they:

A. Are commodity like products

B. Can be mass‐customized and personalized

C. Can be delivered at the time of purchase

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Digital products are best suited for B2C e‐commerce because they are commodity like products,
can be mass‐customized and personalized and can be delivered at the time of purchase.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

21.

All of the following are major B2C business models except ______.
A. content provider

B. industry consortium

C. transaction broker

D. service provider

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
All of the following are major B2C business models except industry consortium. An industry
consortium is a group that involves representatives from several different companies. Usually,
consortia are composed of companies from within a single industry.

22.

The solution for all business needs is.

A. EDI

B. ERP

C. SCM

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The solution for all business needs is ERP. Enterprise resource planning (ERP) is business process
management software that allows an organization to use a system of integrated applications to
manage the business and automate many back office functions related to technology, services and
human resources.
23.

The _________ business model involves an independently owned


vertical digital marketplace for direct inputs.

A. e-distributor

B. exchange

C. e-procurement

D. private industrial network

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The exchange business model involves an independently owned vertical digital marketplace for
direct inputs.

24.

All of the following are techniques B2C e‐commerce companies use to


attract customers, except:

A. Registering with search engines

B. Viral marketing

C. Online ads

D. Virtual marketing

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
Solution:
All of the following are techniques B2C e‐commerce companies use to attract customers, except
Virtual marketing. Viral marketing or viral advertising is a business strategy that uses existing social
networks to promote a product. Its name refers to how consumers spread information about a
product with other people in their social networks, much in the same way that a virus spreads from
one person to another.

25.

Compared to Internet users, the number of cell phone subscribers is


_________.

A. about the same

B. slightly fewer

C. much fewer

D. much larger

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Compared to Internet users, the number of cell phone subscribers is much larger.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

26.

Industry structure is defined as __________.

A. the nature of the players in an industry and their relative bargaining power

B. a set of plans for achieving long term returns on the capital invested in a business firm

C. set of planned activities designed to result in a profit in a marketplace

D. how a company's product or service fulfills the needs of customers

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Industry structure is defined as the nature of the players in an industry and their relative bargaining
power. Industry structure pertains to the number and size distribution of competitors in an industry,
according to University of Maryland University College.

27.

The area of actual or potential commercial value in which a company


intends to operate is a _______.

A. market space

B. marketplace

C. perfect market

D. Bertrand market

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The area of actual or potential commercial value in which a company intends to operate is a market
space. Minimum Viable Product or MVP is the most basic version of the product which the
company wants to launch in the market.

28.

Which term represents a count of the number of people who visit one
site, click on an ad, and are taken to the site of the advertiser?

A. Affiliate programs

B. Click‐through

C. Spam

D. All of the above


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Click‐through term represents a count of the number of people who visit one site, click on an ad,
and are taken to the site of the advertiser.

29.

A perfect market is one in which __________.

A. One firm develops an advantage based on a factor of production that other firms cannot purchase

B. One participant in the market has more resources than the others

C. there are no competitive advantages or asymmetries because all firms have equal access to all the
factors to production

D. competition is at a minimum, as each niche market within an industry is served by the company with
the greatest competitive advantage

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
A perfect market is one in which there are no competitive advantages or asymmetries because all
firms have equal access to all the factors to production.

30.

What is the percentage of customers who visit a Web site and actually
buy something called?

A. Affiliate programs

B. Click‐through
C. Spam

D. Conversion rate

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
No explanation is given for this question Let's Discuss on Board

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

31.

Which of the following is not a horizontal portal?

A. AOL

B. Yahoo

C. Sailnet

D. MSN/Windows Live

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Sailnet is not a horizontal portal. Specialized website (portal) that serves as an entry point to
several firms in the same industry or to the same type of suppliers.

32.

What are materials used in production in a manufacturing company or


are placed on the shelf for sale in a retail environment?

A. Direct materials

B. Indirect materials

C. EDI

D. None of the above


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Direct materials used in production in a manufacturing company or are placed on the shelf for sale
in a retail environment.

33.

A situation where there are no differences among products or services,


and the only basis of choosing products is price is known as
_________.

A. a value web

B. value chain

C. profit

D. commoditization

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A situation where there are no differences among products or services, and the only basis of
choosing products is price is known as commoditization. Commoditization refers to the process of
making something into a commodity. A commodity is a fundamental good used in commerce that is
interchangeable with other commodities of the same type.

34.

What are materials that are necessary for running a modern


corporation, but do not relate to the company's primary business
activities?
A. Direct materials

B. Indirect materials

C. EDI

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Indirect materials are necessary for running a modern corporation, but do not relate to the
company's primary business activities.

35.

A strategy designed to compete in all markets around the globe is


called a _________ strategy.

A. scope

B. differentiation

C. cost

D. focus

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A strategy designed to compete in all markets around the globe is called a scope strategy. Strategic
scope refers to the products and services a company plans to offer over a specific period, and
indicates where and to which target markets they will be sold.
1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

36.
What is the process in which a buyer posts its interest in buying a
certain quantity of items, and sellers compete for the business by
submitting successively lower bids until there is only one seller left?

A. B2B marketplace

B. Intranet

C. Reverse auction

D. Internet

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Reverse auction is the process in which a buyer posts its interest in buying a certain quantity of
items, and sellers compete for the business by submitting successively lower bids until there is only
one seller left.

37.

Which of the following is not one of the stages of the development of


the Internet?

A. Innovation

B. Institutionalization

C. Globalization

D. Commercialization

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option C
Solution:
Globalization is not one of the stages of the development of the Internet. Globalization is the spread
of products, technology, information, and jobs across national borders and cultures. In economic
terms, it describes an interdependence of nations around the globe fostered through free trade.

38.

What are plastic cards the size of a credit card that contains an
embedded chip on which digital information can be stored?

A. Customer relationship management systems cards

B. E‐government identity cards

C. FEDI cards

D. Smart cards

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Smart cards are plastic cards of the size of a credit card that contains an embedded chip on which
digital information can be stored. A smart card, chip card, or integrated circuit card (ICC) is a
physical electronic authorization device, used to control access to a resource.

39.

In 1961, __________ published a paper on "packet switching" networks.

A. Leonard Kleinrock

B. Ray Tomlinson

C. Bob Metcalfe

D. Vint Cerf
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
In 1961, Leonard Kleinrock published a paper on "packet switching" networks. Kleinrock convinced
Roberts of the theoretical feasibility of communications using packets rather than circuits, which
was a major step along the path towards computer networking.

40.

Most individuals are familiar with which form of e‐commerce?

A. B2B

B. B2C

C. C2B

D. C2C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Most individuals are familiar with B2C form of e‐commerce. B2C eCommerce refers to the process
of selling to individual customers directly.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

41.

The component of TCP/IP that provides the Internet's addressing


scheme and is responsible for the actual delivery of packets is
________.

A. TCP

B. IP

C. the Network Layer

D. the Application Layer


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The component of TCP/IP that provides the Internet's addressing scheme and is responsible for the
actual delivery of packets is IP. TCP/IP is a shorthand for the two most important protocols used to
make the Internet work. The Internet Protocol (IP) is responsible for transferring these data packets,
while the Transmission Control Protocol (TCP) makes sure all packets arrive safely, retransmitting
them if necessary.

42.

Which form of e‐commerce currently accounts for about 97% of all e‐


commerce revenues?

A. B2B

B. B2C

C. C2B

D. C2C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
B2B form of e‐commerce currently accounts for about 97% of all e‐commerce revenues. Business-
to-business is a situation where one business makes a commercial transaction with another.

43.

Which protocol permits users to transfer files from the server to their
client computer, and vice versa?

A. HTTP
B. SMTP

C. IMAP

D. FTP

Answer & Solution Discuss in Board Save for Later

44.

Which of the following are advantages normally associated with B2B e‐


commerce?

A. Shorter cycle times

B. Reduction in costs

C. Reaches wider audiences

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Shorter cycle times, reduction in costs and it reaches wider audiences are advantages normally
associated with B2B e‐commerce.

45.

__________ is a program that you can run from the DOS prompt in the
Windows operating system in order to check the connection between
your client and the server.

A. Ping

B. Telnet
C. Tracert

D. SSL

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Ping is a program that you can run from the DOS prompt in the Windows operating system in order
to check the connection between your client and the server. Ping is used to test the ability of one
network host to communicate with another. Simply enter the Ping command, followed by the name
or the IP address of the destination host.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

46.

If the threat of substitute products or services is low it is a(n):

A. Disadvantage to the supplier

B. Advantage to the buyer

C. Advantage to the supplier

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
If the threat of substitute products or services is low it is an advantage to the supplier.

47.

Broadband is generally considered to be any communication


technology allowing streaming audio and video at or above _________.

A. 100 Kbps

B. 56.6 Kbps

C. 30 Kbps
D. 10 Kbps

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Broadband is generally considered to be any communication technology allowing streaming audio
and video at or above 100 Kbps.

48.

The threat of new entrants is high when it is:

A. Hard for customers to enter the market

B. Hard for competitors to enter the market

C. Easy for competitors to enter the market

D. Easy for customers to enter the market

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The threat of new entrants is high when it is Easy for competitors to enter the market. A high threat
of new entrants makes an industry less attractive – there are low barriers to entry. Therefore, new
competitors are able to easily enter into the industry, compete with existing firms, and take market
share. There is a reduced profit potential as more competitors are in the industry.

49.

Which of the following connections allows the fastest download


speeds?

A. DSL
B. cable modem

C. T1

D. T3

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
T3 connections allows the fastest download speeds. T3 Internet service lines operate at speeds of
45 Mbps (672 times faster than a 56K dial-up, and 29 times faster than T1 connection).

50.

If it is easy for competitors to enter the market, the threat of new


entrants is considered:

A. High

B. Low

C. More

D. Less

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
If it is easy for competitors to enter the market, the threat of new entrants is considered high. Threat
of new entrants refers to the threat new competitors pose to existing competitors in an industry.
Therefore, a profitable industry will attract more competitors looking to achieve profits.

1234567891011121314
Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

51.

Which of the following is not a limitation of the current Internet?

A. insufficient capacity throughout the backbone

B. network architecture limitations


C. insufficient reach

D. best-efforts QOS

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Insufficient reach is not a limitation of the current Internet.

52.

Unique value auction is mainly applies to?

A. New products

B. Second hand products

C. Engineering products

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Unique value auction is mainly applies to Second hand products.

53.

All of the following are goals of Internet 2 except ______.

A. Creating a leading-edge very high-speed network capability for the national research community

B. Eliminating censorship from the Internet


C. Enabling revolutionary Internet applications

D. Ensuring the rapid transfer of new network services and applications to the broader Internet community

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
All of the following are goals of Internet 2 except Eliminating censorship from the Internet.

54.

Paisapay is facilitated in.

A. eBay.co.in

B. amazon.com

C. flipkart.com

D. none of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Paisapay is facilitated in. eBay.co.in. PaisaPay is eBay's online payment service, where buyers can
pay sellers through credit card or Online Bank Transfer.

55.

Which of the following is a new and disruptive Web feature or service?

A. XML

B. diffserv
C. blogs

D. CDMA

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Blogs is a new and disruptive Web feature or service. A blog (shortening of “weblog”) is an online
journal or informational website displaying information in the reverse chronological order, with latest
posts appearing first. It is a platform where a writer or even a group of writers share their views on
an individual subject.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

56.

Which of the following is a useful security mechanism when


considering business strategy and IT?

A. encryption

B. decryption

C. firewall

D. all the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Encryption, decryption and firewall is a useful security mechanism when considering business
strategy and IT.

57.

All of the following are examples of 2G wireless phone technologies


except _________.

A. CDMA

B. W-CDMA
C. TDMA

D. GSM

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
All of the following are examples of 2G wireless phone technologies except W-CDMA. WCDMA is
the most commonly used variant of the Universal Mobile Telecommunications System (UMTS ).

58.

Which of the following is not related to security mechanism?

A. encryption

B. decryption

C. e‐cash

D. all the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
e‐cash is not related to security mechanism. It is also known as electronic cash, it is a digital money
product that provides a way to pay for products and services without resorting to paper or coin
currency.

59.

All of the following are wireless Internet access network technologies


except ________.

A. Wi-Fi
B. Bluetooth

C. Zigbee

D. GigaPoP

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are wireless Internet access network technologies except GigaPoP. A gigabit
point of presence (GigaPOP) is an individual access point to something called Internet2 that
represents a high-speed IP network maintained by universities and other parties.

60.

A product or service that customers have come to expect from an


industry, which must be offered by new entrants if they wish to compete
and survive, is known as a(n)?

A. Switching costs

B. Loyalty programs

C. Entry barriers

D. Affiliate programs

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
A product or service that customers have come to expect from an industry, which must be offered
by new entrants if they wish to compete and survive, is known as an Entry barriers.

1234567891011121314
Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

61.

Internet users account for about ________ of the world's population.

A. 0.07

B. 0.17
C. 0.27

D. 0.47

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Internet users account for about 0.17 of the world's population.

62.

Which of the following statements accurately reflect the impact of


technology?

A. Technology has caused buyer power to increase

B. Technology has lessened the entry barriers for many industries

C. Technology has increased the threat of substitute products and services

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Technology has caused buyer power to increase, Technology has lessened the entry barriers for
many industries and Technology has increased the threat of substitute products and services
statements accurately reflect the impact of technology.

63.

Which of the following was the first commercial Web browser?

A. Mosaic
B. Mozilla

C. Netscape Navigator

D. Internet Explorer

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Netscape Navigator was the first commercial Web browser. Netscape Navigator browser was
released by the Mosaic (later Netscape) Corporation. Before Microsoft's Internet Explorer became
the dominant browser, Netscape Navigator was the most popular way to connect to the Web.

64.

A business cannot be all things to all people. Instead, a business must:

A. Identify target customers

B. Identify the value of products/services as perceived by customers

C. all of the above

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
A business cannot be all things to all people. Instead, a business must Identify target customers
and Identify the value of products/services as perceived by customers.

65.

All of the following are steps in the systems development life cycle
except ______.
A. Systems Design

B. Testing

C. Implementation

D. Debugging

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are steps in the systems development life cycle except Debugging. Debugging is
the process of finding and resolving defects or problems within a computer program that prevent
correct operation of computer software or a system.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

66.

How the transactions occur in e‐commerce?

A. Using e‐medias

B. Using computers only

C. Using mobile phones only

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The transactions occur in e‐commerce using e‐medias.

67.

A _________ describes the flow of information at your e-commerce site


and the infrastructure that will be used in the system.

A. system design
B. logical design

C. tactical design

D. physical design

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A logical design describes the flow of information at your e-commerce site and the infrastructure
that will be used in the system. Logical design is the conceptual design of a system. It describes the
flow of information at your e-commerce site, the processing functions that must be performed, the
database that will be used, the security and emergency backup procedures that will be instituted,
and the controls that will be used in the system.

68.

Which type of products is lesser purchased using eCommerce?

A. automobiles

B. books

C. softwares

D. none

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Automobiles type of products is lesser purchased using eCommerce.

69.
All of the following are factors in optimizing Web site performance
except _________.

A. page retrieval

B. page generation

C. page delivery

D. page content

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
All of the following are factors in optimizing Web site performance except page retrieval. Page
retrieval is a part that uses web robot to retrieve the desired web page to database.

70.

A business competing in a commodity like environment must focus on


which of the following?

A. Price

B. Ease / speed of delivery

C. Ease of ordering

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A business competing in a commodity like environment must focus on Price, Ease / speed of
delivery and Ease of ordering.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Section2

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

1.
The dominant Web server software is __________.

A. Zeus

B. Apache

C. Microsoft IIS

D. Google

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The dominant Web server software is Apache. Apache played a key role in the initial growth of the
World Wide Web, quickly overtaking NCSA HTTPd as the dominant HTTP server, and has
remained most popular since April 1996.

2.

Which of the following refers to creating products tailored to individual


customers?

A. customization

B. aggregation

C. Direct materials

D. Reverse auction

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Customization refers to creating products tailored to individual customers. It is the action of making
or changing something according to the buyer's or user's needs.

3.

What Web server functionality allows it verify usernames and


passwords and process certificates and encryption information?

A. Processing of HTTP requests

B. File Transfer Protocol

C. Data capture

D. Security services

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Security services Web server functionality allows it verify usernames and passwords and process
certificates and encryption information.

4.

Materials used in the normal operation of a business but not related to


primary business operations are called what?

A. Supplies

B. Direct materials

C. Indirect materials

D. Daily stuff

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
Materials used in the normal operation of a business but not related to primary business operations
are called Indirect materials. Indirect materials are materials used in the production process, but
which cannot be linked to a specific product or job.

5.

The underlying computing equipment that the system uses to achieve


its e-commerce functionality is called a ________.

A. hardware platform

B. content platform

C. transaction platform

D. scalability platform

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The underlying computing equipment that the system uses to achieve its e-commerce functionality
is called a hardware platform.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

6.

Amazon.com is well‐known for which e‐commerce marketing


technique?

A. Banner ads

B. Pop‐up ads

C. Affiliate programs

D. Viral marketing

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
Amazon.com is well‐known for Affiliate programs e‐commerce marketing technique.

7.

Redundant navigation refers to _________.

A. pages that work, load quickly, and point the customer toward your product offerings

B. simple, fool-proof navigation

C. a site working with the most popular browsers

D. alternative navigation to the same content

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Redundant navigation refers to alternative navigation to the same content. Redundant navigation
can help users find what they're looking for. Redundancy in documentation is usually bad: When
you have the same content (in different words) in two places, you pay twice for localization – yet
you probably only remember to update one of the items.

8.

What is the name given to an interactive business providing a


centralized market where many buyers and suppliers can come together
for e‐commerce or commerce‐related activities?

A. Direct marketplace

B. B2B

C. B2C
D. Electronic marketplace

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Electronic marketplace is the name given to an interactive business providing a centralized market
where many buyers and suppliers can come together for e‐commerce or commerce‐related
activities.

9.

The set of standards for communication between a browser and a


program running on a server that allows for interaction between the
user and the server is known as _________.

A. Active Server Pages (ASP)

B. Java Server Pages (JSP)

C. Common Gateway Interface (CGI)

D. VBScript

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The set of standards for communication between a browser and a program running on a server that
allows for interaction between the user and the server is known as Common Gateway Interface
(CGI).

10.

Which form of e‐marketplace brings together buyers and sellers from


multiple industries, often for MRO materials?
A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Horizontal form of e‐marketplace brings together buyers and sellers from multiple industries, often
for MRO materials. Horizontal e-commerce outfits focus on the breadth of product offerings, while
vertical ones concentrate on depth.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

11.

Which of the following is not a widely used midrange or high-end e-


commerce suite?

A. Microsoft Commerce Server

B. WebTrends Marketing Lab2

C. IBM WebSphere Commerce

D. Broadvision Commerce

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Microsoft Commerce Server is not a widely used midrange or high-end e-commerce suite. Microsoft
is one of the providers of commerce servers. Microsoft Commerce Server was first released in 2000
and was used to creatie e-commerce systems. It uses Microsoft's .NET technology.

12.

Which form of e‐marketplace brings together buyers and sellers from


the same industry?
A. horizontal

B. Vertical

C. Integrated

D. Inclined

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Vertical form of e‐marketplace brings together buyers and sellers from the same industry. It is an e-
marketplace that offer goods and services directly related to the production process of a specific
industrial sector.

13.

The ability to change the product to better fit the needs of the customer
is called ________.

A. customization

B. personalization

C. privacy

D. accessibility

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The ability to change the product to better fit the needs of the customer is called customization. It is
the action of modifying something to suit a particular individual or task.
14.

Which type of add appears on a web page?

A. pop‐under ad

B. Pop‐up ad

C. Banner ad

D. Discount ad

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Banner ad appears on a web page.

15.

All of the following are tools for optimizing a Web site's location in
search engine listings except ________.

A. keywords and page titles

B. identifying market niches

C. buying ads

D. benchmarking

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are tools for optimizing a Web site's location in search engine listings except
benchmarking. Benchmarking is a process of measuring the performance of a company's products,
services, or processes against those of another business considered to be the best in the industry,
aka “best in class.”

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

16.
What type of ad appears on top of a web page?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. discount ad

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
pop‐up ad type of ad appears on top of a web up ad. Pop-up ads or pop-ups are forms of online
advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area,
usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.

17.

The most common type of Internet crime according to the IC3 is ______.

A. Credit card fraud

B. Check fraud

C. Non-delivery

D. Auction fraud

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The most common type of Internet crime according to the IC3 is Auction fraud. Internet auction
fraud involves schemes attributable to the misrepresentation of a product advertised for sale
through an Internet auction site or the non-delivery of products purchased through an Internet
auction site.

18.

What type of ad appears under a web page?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. discount ad

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Pop‐under ad appears under a web page. A type of window that appears behind the browser
window of a Web site that a user has visited. In contrast to a pop-up ad, which appears over (on top
of) the browser window, a pop-under is less obtrusive as it hides behind other windows.

19.

In the e-commerce security environment, which of the following


constitutes the inner-most layer?

A. people

B. data

C. technology solutions

D. organizational policies and procedures

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
In the e-commerce security environment, data constitutes the inner-most layer. E-Commerce
security refers to the principles which guide safe electronic transactions, allowing the buying and
selling of goods and services through the Internet, but with protocols in place to provide safety for
those involved.

20.

Which, if any, of the following types of ads are people most willing to
tolerate?

A. pop‐under ad

B. pop‐up ad

C. banner ad

D. none of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
people most willing doesn't tolerate any type of ads.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

21.

All of the following are major categories of computer viruses except


_________.

A. Macro viruses

B. File-infecting viruses

C. Script viruses

D. Trojan viruses

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
All of the following are major categories of computer viruses except Trojan viruses. Trojan or Trojan
horse is a type of malicious software. Trojan virus is designed to spy on the victims computer,
access files or to extract sensitive data.

22.

Which of the following is an Internet‐based company that makes it easy


for one person to pay another over the Internet?

A. electronic check

B. electronic bill presentment and payment

C. conversion rates

D. financial cybermediary

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A financial cybermediary is an internet based company that makes it easy to transfer money from
one person to another.

23.

A worm is designed to spread _________.

A. from computer to computer

B. from file to file on a computer

C. from Web site to Web site


D. from Web site to computer

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A worm is designed to spread from computer to computer. A computer worm is a standalone
malware computer program that replicates itself in order to spread to other computers. Often, it
uses a computer network to spread itself, relying on security failures on the target computer to
access it.

24.

Which of the following is a method of transferring money from one


person's account to another?

A. electronic check

B. credit card

C. e‐transfer

D. none of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Electronic check is a method of transferring money from one person's account to another. An
electronic check, also referred to as an e-check, is a form of payment made via the Internet, or
another data network, designed to perform the same function as a conventional paper check.

25.

Malicious hackers who act with the intention of causing harm are
__________.
A. White hats

B. Black hats

C. Grey hats

D. Brown hats

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Malicious hackers who act with the intention of causing harm are Black hats. Black hat refers to a
hacker who breaks into a computer system or network with malicious intent. A black hat hacker
may exploit security vulnerabilities for monetary gain; to steal or destroy private data; or to alter,
disrupt or shut down websites and networks.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

26.

An electronic check is one form of what?

A. e‐commerce

B. online banking

C. e‐cash

D. check

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
An electronic check is one form of online banking. An eCheck (or electronic check) is an electronic
version of a paper check used to make payments online.

27.

When hackers flood a Web site with useless traffic to overwhelm the
network, it is called ______.
A. phishing

B. pharming

C. a Denial of Service (DoS) attack

D. spoofing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
When hackers flood a Web site with useless traffic to overwhelm the network, it is called a Denial of
Service (DoS) attack. A denial-of-service attack (DoS attack) is a cyber-attack in which the
perpetrator seeks to make a machine or network resource unavailable to its intended users by
temporarily or indefinitely disrupting services of a host connected to the Internet.

28.

If you need to transfer money to another person via the internet, which
of the following methods could you use?

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
If you need to transfer money to another person via the internet, the methods that could be use are
financial cybermediary, electronic check and electronic bill presentment and payment.
29.

Which of the following is not a dimension of e-commerce security


provided by encryption?

A. availability

B. message integrity

C. nonrepudiation

D. confidentiality

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Availability is not a dimension of e-commerce security provided by encryption. eCommerce security
refers to the principles which guide safe electronic transactions, allowing the buying and selling of
goods and services through the Internet, but with protocols in place to provide safety for those
involved.

30.

Which of the following permits the transmission of a bill, along with


payment of that bill, to be conducted over the Internet?

A. financial cybermediary

B. electronic check

C. electronic bill presentment and payment

D. all of the above

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
Electronic bill presentment and payment permits the transmission of a bill, along with payment of
that bill, to be conducted over the Internet. Electronic Bill Payment & Presentment (EBPP) is a
process, which companies use to collect payments via the Internet, direct dial access, Automated
Teller Machine (ATM), or other electronic method. Electronic Bill Payment & Presentment is a core
component of many financial institutions' online banking offerings.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

31.

The most widely used encryption standard is ______.

A. Advanced Encryption Standard (AES)

B. Data Encryption Standard (DES)

C. Universal Encryption Standard (UES)

D. Optimal Encryption Standard (OES)

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The most widely used encryption standard is Advanced Encryption Standard (AES). The Advanced
Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect
classified information and is implemented in software and hardware throughout the world to encrypt
sensitive data.

32.

A combination of software and information designed to provide security


and information for payment is called a what?

A. digital wallet

B. pop up ad

C. shopping cart

D. encryption
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A combination of software and information designed to provide security and information for
payment is called digital wallet. A digital wallet is a system that securely stores users' payment
information and passwords for numerous payment methods and websites.

33.

The most common form of securing channels is through ________.

A. S-HTTP

B. VPNs

C. SSL

D. PPTP

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The most common form of securing channels is through SSL. SSL (Secure Sockets Layer) is a
standard security technology for establishing an encrypted link between a server and a client—
typically a web server (website) and a browser; or a mail server and a mail client (e.g., Outlook).

34.

What is the name for direct computer‐to‐computer transfer of


transaction information contained in standard business documents?

A. internet commerce

B. e‐commerce
C. transaction information transfer

D. electronic data interchange

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The name for direct computer‐to‐computer transfer of transaction information contained in standard
business documents is electronic data interchange. Electronic Data Interchange (EDI) is the
electronic interchange of business information using a standardized format; a process which allows
one company to send information to another company electronically rather than with paper.

35.

Firewalls perform all of the following functions except _________.

A. Forbids communications from untrustworthy sources

B. Allows communications from trustworthy sources

C. Eliminates viruses and other malicious attacks

D. Filters traffic based on packet attributes

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Firewalls perform all of the following functions except Eliminates viruses and other malicious
attacks.

1234567891011121314

Read More Section(Ecommerce)


Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

36.

Which of the following is used in B2B to pay for purchases?

A. e‐commerce

B. financial electronic data interchange

C. electronic data exchange


D. electronic checks

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Financial electronic data interchange is used in B2B to pay for purchases. Business-to-business is
a situation where one business makes a commercial transaction with another.

37.

A security plan begins with a(n) is ______.

A. security policy

B. risk assessment

C. implementation plan

D. security organization

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A security plan begins with a risk assessment. Risk assessment is a term used to describe the
overall process or method where you: Identify hazards and risk factors that have the potential to
cause harm (hazard identification). Analyze and evaluate the risk associated with that hazard (risk
analysis, and risk evaluation).

38.

Public key encryption uses multiple keys.ne key is used to encrypt data,
while another is used to decrypt data.he key used to encrypt data is
called the _______ key, while the key used to decrypt data is called the
________ key.
A. encryption, decryption

B. private, public

C. encryption, public

D. public, private

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
No explanation is given for this question Let's Discuss on Board

39.

The only payment system that is instantly convertible without


intermediation is _______.

A. Credit card

B. Accumulating balance

C. Stored value

D. Cash

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The only payment system that is instantly convertible without intermediation is Cash.

40.

Secure Sockets Layers does which of the following?


A. creates a secure, private connection to a web server

B. encrypts information

C. sends information over the internet

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Secure Sockets Layers creates a secure, private connection to a web server, encrypts information
and sends information over the internet.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

41.

The most prevalent online payment method is ______.

A. PayPal

B. checks

C. credit cards

D. debit

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The most prevalent online payment method is credit cards. Over the years, credit cards have
become one of the most common forms of payment for e-commerce transactions.

42.

When a transaction is processed online, how can the merchant verify


the customer's identity?

A. use secure sockets layers


B. use secure electronic transactions

C. use electronic data interchange

D. use financial electronic data interchange

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
When a transaction is processed online, use secure electronic transactions the merchant can verify
the customer's identity by using secure electronic transactions.

43.

What is the name of the division of the U.S. Department of Homeland


Security that coordinates cyber incident warnings and responses
across government and private sectors?

A. US-CERT

B. OECD

C. IC3

D. P3P

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
US-CERT is the name of the division of the U.S. Department of Homeland Security that coordinates
cyber incident warnings and responses across government and private sectors.

44.
The practice of forging a return address on an e‐mail so that the
recipient is fooled into revealing private information is termed?

A. hacking

B. cracking

C. dumpster diving

D. spoofing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing
private information is termed as spoofing. A spoofing attack is a situation in which a person or
program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

45.

After sending e-mail, which of the following activities is most common


among Internet users?

A. sending instant messages

B. reading someone else's blog

C. using a search engine to find information

D. getting news

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
After sending e-mail, using a search engine to find information is most common among Internet
users.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

46.
What is a model of a proposed product, service, or system?

A. Prototyping

B. Prototype

C. Proof‐of‐concept prototype

D. Selling prototype

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Prototype is a model of a proposed product, service, or system. A prototype is an original model,
form or an instance that serves as a basis for other processes.

47.

__________ influence the behavior of others through their personality,


skills, or other factors.

A. Opinion leaders

B. Direct reference groups

C. Indirect reference groups

D. Lifestyle groups

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Opinion leaders influence the behavior of others through their personality, skills, or other factors.
Opinion leaders are individuals or organizations that are able to influence people by their opinion.
48.

What is an internal organizational Internet that is guarded against


outside access by a special security feature called a firewall (which can
be software, hardware, or a combination of the two)?

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Intranet is an internal organizational Internet that is guarded against outside access by a special
security feature called a firewall (which can be software, hardware, or a combination of the two). An
intranet is a private network that is contained within an enterprise. It may consist of many interlinked
local area networks and also use leased lines in the wide area network.

49.

A good or service for which there are many dealers supplying the same
product, and all products in the segment are essentially identical is
known as _______.

A. commodity

B. core product

C. actual product

D. augmented product
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A good or service for which there are many dealers supplying the same product, and all products in
the segment are essentially identical is known as commodity. A commodity is a basic good used in
commerce that is interchangeable with other commodities of the same type. Commodities are most
often used as inputs in the production of other goods or services.

50.

What is an intranet that is restricted to an organization and certain


outsiders, such as customers and suppliers?

A. Client/server network

B. Intranet

C. Extranet

D. Thin client

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Extranet is an intranet that is restricted to an organization and certain outsiders, such as customers
and suppliers. An extranet is a private network that uses Internet technology and the public
telecommunication system to securely share part of a business's information or operations with
suppliers, vendors, partners, customers, or other businesses.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

51.

Complete price transparency in a perfect information marketplace is


necessary for ____________ to take effect.

A. Bertrand's Law

B. the Law of Universal Prices

C. the Law of One Price


D. the Law of Perfect Commerce

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Complete price transparency in a perfect information marketplace is necessary for the Law of One
Price to take effect. The law of one price states that in the absence of trade frictions, and under
conditions of free competition and price flexibility, identical goods sold in different locations must
sell for the same price when prices are expressed in a common currency.

52.

What is a detailed process for recovering information or an IT system in


the event of a catastrophic disaster such as a fire or flood?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Disaster recovery plan is a detailed process for recovering information or an IT system in the event
of a catastrophic disaster such as a fire or flood. A disaster recovery plan (DRP) is a documented,
structured approach with instructions for responding to unplanned incidents.

53.

A(n) _________ represents data as two-dimensional tables with records


organized in rows and attributes in columns.
A. database management system

B. data warehouse

C. SQL query

D. relational database

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A relational database represents data as two-dimensional tables with records organized in rows
and attributes in columns. A relational database is a set of formally described tables from which
data can be accessed or reassembled in many different ways without having to reorganize the
database tables.

54.

What is a separate facility that does not have any computer equipment
but is a place where the knowledge workers can move after the
disaster?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Cold site is a separate facility that does not have any computer equipment but is a place where the
knowledge workers can move after the disaster. A cold site is a business location that is used for
backup in the event of a disruptive operational disaster at the normal business site.

55.

All of the following are types of data mining except ______.

A. selective data mining

B. query-driven data mining

C. model-driven data mining

D. rule-based data mining

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
All of the following are types of data mining except selective data mining.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

56.

What is a separate and fully equipped facility where the company can
move immediately after the disaster and resume business?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Hot site is a separate and fully equipped facility where the company can move immediately after the
disaster and resume business. A hot site is a commercial disaster recovery service that allows a
business to continue computer and network operations in the event of a computer or equipment
disaster.

57.

Which of the following market entry strategies are the most common for
existing firms?

A. first mover

B. fast follower

C. brand extender

D. alliances

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Brand extender market entry strategies are the most common for existing firms. Brand Extension is
the use of an established brand name in new product categories.

58.

What charts (1) the cost to your organization of the unavailability of


information and technology and (2) the cost to your organization of
recovering from a disaster over time?

A. Disaster recovery plan

B. Hot site

C. Cold site

D. Disaster recovery cost curve

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
Disaster recovery cost curve charts the cost to your organization of the unavailability of information
and technology and the cost to your organization of recovering from a disaster over time.

59.

The process of getting customers to pass along a company's marketing


message to friends, family, and colleagues is known as _______.

A. affiliate marketing

B. viral marketing

C. permission marketing

D. blog marketing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The process of getting customers to pass along a company's marketing message to friends, family,
and colleagues is known as viral marketing. Viral marketing or viral advertising is a business
strategy that uses existing social networks to promote a product.

60.

Which factor determines when your IT system will be available for


knowledge workers to access?

A. Availability

B. Accessibility

C. Reliability
D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Availability factor determines when your IT system will be available for knowledge workers to
access.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

61.

The per-product price consumers are willing to pay for a bundle


____________ as the number of goods in the bundle increases.

A. decreases

B. increases

C. varies from product to product

D. stays the same

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The per-product price consumers are willing to pay for a bundle increases as the number of goods
in the bundle increases. The willingness of consumers to pay can, at times, be quite volatile. With
bundle pricing, the seller lowers the variance on this willingness to pay and increases its profit by
selling bundles of products instead of selling all products separately.

62.

Which factor determines who has the right to access different types of
IT systems and information?

A. Availability

B. Accessibility

C. Reliability
D. Scalability

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Accessibility factor determines who has the right to access different types of IT systems and
information.

63.

Creating multiple versions of information goods and selling essentially


the same product to different market segments at different prices is
called__________.

A. versioning

B. bundling

C. transactive content

D. price discrimination

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Creating multiple versions of information goods and selling essentially the same product to different
market segments at different prices is called versioning. Versioning is the creation and
management of multiple releases of a product, all of which have the same general function but are
improved, upgraded or customized.

64.

Which factor ensures your IT systems are functioning correctly and


providing accurate information?
A. Availability

B. Accessibility

C. Reliability

D. Scalability

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Reliability factor ensures your IT systems are functioning correctly and providing accurate
information. The term reliability in psychological research refers to the consistency of a research
study or measuring test.

65.

All of the following are examples of intelligent agent technology except


________.

A. automated response systems

B. automatic shipping confirmation

C. order status reports

D. online web bugs

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are examples of intelligent agent technology except online web bugs.

1234567891011121314
Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

66.

Which factor represents how well your system can adapt to increased
demands?

A. Availability
B. Accessibility

C. Reliability

D. Scalability

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Scalability factor represents how well your system can adapt to increased demands. Scalability is
an attribute that describes the ability of a process, network, software or organization to grow and
manage increased demand.

67.

E-business can be defined as_______.

A. the uninhibited flow of information and goods on the Web

B. the use of the Internet and the Web to transact business

C. digitally enabled transactions and processes within an organization

D. commercial transactions involving electronic goods

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
E-business can be defined as digitally enabled transactions and processes within an organization.
E-business or Online business means business transactions that take place online with the help of
the internet. The term e-business came into existence in the year 1996. E-business is an
abbreviation for electronic business.

68.
Which factor represents a system's ability to change quickly?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Flexibility factor represents a system's ability to change quickly. Flexibility is Key to E-commerce
Stability.

69.

The set of applications and technologies that allow users to create, edit,
and distribute content online is known as______.

A. Internet

B. social networking

C. virtual life

D. Web 2.0

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The set of applications and technologies that allow users to create, edit, and distribute content
online is known as Web 2.0. Web 2.0 Websites allow users to do more than just retrieve
information.

70.

What is a set of conditions used to measure how well a product or


system functions?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Benchmark is a set of conditions used to measure how well a product or system functions.
Benchmarking is the process through which a company measures its products, services, and
practices against its toughest competitors, or those companies recognized as leaders in its industry.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 3
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Section3

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

1.

Which of the following represents a limiting factor for the growth of e-


commerce?

A. Persistent cultural attraction of physical markets and traditional shopping experiences

B. Inadequate selection of goods compared to physical marketplaces

C. E-commerce lacks the convenience of other methods of transacting business

D. The potential audience for e-commerce is too low to support it as a widespread method of commerce

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option A
Solution:
Persistent cultural attraction of physical markets and traditional shopping experiences represents a
limiting factor for the growth of e-commerce.

2.

What determines the future IT infrastructure requirements for new


equipment and additional network capacity?

A. Flexibility

B. Performance

C. Capacity planning

D. Benchmark

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Capacity planning determines the future IT infrastructure requirements for new equipment and
additional network capacity.

3.

The fastest growing form of online advertising is _________.

A. banner ads

B. pop-up ads

C. rich media/video ads

D. pop-under ads

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option C
Solution:
The fastest growing form of online advertising is rich media/video ads. Online advertising, also
called online marketing or Internet advertising or web advertising, is a form of marketing and
advertising which uses the Internet to deliver promotional marketing messages to consumers.

4.

What automates business processes?

A. Workflow

B. ASP

C. Workflow system

D. EIP

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Workflow system automates business processes. A workflow management system provides an
infrastructure for the set-up, performance and monitoring of a defined sequence of tasks, arranged
as a workflow application.

5.

All of the following are among the most common categories of spam
except ______.

A. fraud

B. commercial products

C. finance
D. health (drugs)

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
All of the following are among the most common categories of spam except fraud. Fraud is
intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

6.

What defines all of the steps or business rules, from beginning to end,
required for a process to run correctly?

A. Workflow

B. EIP

C. Workflow system

D. SLA

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Workflow defines all of the steps or business rules, from beginning to end, required for a process to
run correctly.

7.

All of the following are types of social marketing except ______.

A. affiliate marketing

B. blog advertising

C. social network advertising

D. game advertising
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
All of the following are types of social marketing except affiliate marketing. Affiliate marketing is the
process of earning a commission by promoting other people's (or company's) products.

8.

What sends work assignments through an e‐mail system?

A. Database‐based enterprise information portal

B. Messaging‐based enterprise information portal

C. Database‐based workflow system

D. Messaging‐based workflow system

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Messaging‐based workflow system sends work assignments through an e‐mail system.

9.

Which of the following measures the percentage of people exposed to


an online advertisement who actually click on the banner?

A. impression rate

B. view-through rate

C. click-through rate
D. stickiness ratio

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
click-through rate measures the percentage of people exposed to an online advertisement who
actually click on the banner. Click-through rate (CTR) is the ratio of users who click on a specific
link to the number of total users who view a page, email, or advertisement.

10.

Which will not a computer resources?

A. firewall

B. Virus

C. Trojan horse

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Firewall is not a computer resources. A firewall is a hardware or software device designed to permit
or deny data through a computer network in order to protect the resources of a private network from
users from other networks.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

11.

Which of the following is a measure of the percentage of purchasers


who return to a Web site within a year?

A. loyalty

B. reach

C. recency

D. unique visitors
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Loyalty is a measure of the percentage of purchasers who return to a Web site within a year.

12.

Which is not a function of ERP?

A. Warehousing

B. sales

C. scheduling

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using computer technology to link various
Functions—such as accounting, inventory control, and human resources—across an entire
company. However, there are certain things that we need to consider in the ERP to enhance the
business processes.

13.

All of the following are metrics for e-mail campaigns except _________.

A. open rate

B. delivery rate

C. bounce-back rate
D. cart conversion rate

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are metrics for e-mail campaigns except cart conversion rate. The conversion
rate is the number of conversions divided by the total number of visitors.

14.

Which is a function of ERP?

A. Warehousing

B. sales

C. scheduling

D. all of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The function of ERP are Warehousing, sales and scheduling.

15.

As consumers become more accustomed to new online advertising


formats, click-through rates tend to _______.

A. remain constant

B. decrease
C. increase

D. rapidly increase

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
As consumers become more accustomed to new online advertising formats, click-through rates
tend to decrease.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

16.

Which of the following is the primary characteristic of an intranet?

A. People outside the organization can access it

B. People inside the organization can't access it

C. People outside the organization can't access it

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
People outside the organization can't access it is the primary characteristic of an intranet.

17.

The ethical principle which states that if an action is not right for all
situations, then it is not right for any situation is known as __________.

A. The Golden Rule

B. Slippery Slope

C. No Free Lunch

D. Universalism
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The ethical principle which states that if an action is not right for all situations, then it is not right for
any situation is known as Universalism. Universalism is defined as an action that should be same in
all the situations.

18.

Which concept suggests that different applications and computer


systems should be able to communicate with one another?

A. Integration

B. Web services

C. Scalability

D. Interoperability

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Interoperability concept suggests that different applications and computer systems should be able
to communicate with one another. Interoperability is the ability of different information systems,
devices or applications to connect, in a coordinated manner, within and across organizational
boundaries to access, exchange and cooperatively use data amongst stakeholders, with the goal of
optimizing the health of individuals and populations.

19.

Which of the following statements about privacy is true?

A. It is a moral right to be left alone

B. Only corporations and government need to be concerned about it


C. It has only just recently become a concern

D. It is most easily obtained on the Internet

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Privacy is a moral right to be left alone. Privacy is the ability of an individual or group to seclude
themselves, or information about themselves, and thereby express themselves selectively. The
boundaries and content of what is considered private differ among cultures and individuals.

20.

Which service encompasses all technologies used to transmit and


process information on an across a network?

A. Interoperability

B. Scalability

C. Benchmarking

D. Web services

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Web services encompasses all technologies used to transmit and process information on an across
a network. Web services is a standardized way or medium to propagate communication between
the client and server applications on the World Wide Web.

1234567891011121314

Read More Section(Ecommerce)


Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

21.

The ability of consumers to review and contest the accuracy and


completeness of data collected about them involves which of the
following FTC fair information practice principles?

A. Security

B. Enforcement
C. Choice/Consent

D. Access/Participation

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The ability of consumers to review and contest the accuracy and completeness of data collected
about them involves Access/Participation FTC fair information practice principles.

22.

Which process can preventata from lose due to computer problems or


human errors?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Backup process can prevent from lose due to computer problems or human errors. Backup, or data
backup, or the process of backing up, refers to the copying into an archive file of computer data that
is already in secondary storage—so that it may be used to restore the original after a data loss
event.

23.

The __________ is the first major effort to adjust the copyright laws to
the Internet age.
A. Platform for Privacy Preferences (P3P)

B. Center for Democracy and Technology

C. Digital Millennium Copyright Act (DMCA)

D. E-Government Act of 2002

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The Digital Millennium Copyright Act (DMCA) is the first major effort to adjust the copyright laws to
the Internet age. The Digital Millennium Copyright Act is a 1998 United States copyright law that
implements two 1996 treaties of the World Intellectual Property Organization. It criminalizes
production and dissemination of technology, devices, or services intended to circumvent measures
that control access to copyrighted works.

24.

Which process is used to reinstall data from a copy when the original
data has been lost?

A. backup

B. recovery

C. benchmarking

D. data cleansing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Recovery process is used to reinstall data from a copy when the original data has been lost. Data
restore is the process of copying backup data from secondary storage and restoring it to its original
location or a new location.

25.

A patent grants the owner an exclusive monopoly on the ideas behind


the invention for ______ years.

A. 10

B. 20

C. 30

D. 40

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A patent grants the owner an exclusive monopoly on the ideas behind the invention for 20 years.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

26.

What describes a process of continuously measuring results and


comparing those results to optimal performance so that actual
performance may be improved?

A. Performance

B. Capacity planning

C. Benchmarking

D. Data cleansing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Benchmarking describes a process of continuously measuring results and comparing those results
to optimal performance so that actual performance may be improved.

27.

The number of business methods patents granted is ___________


compared to the number of patents applied for.

A. substantially smaller

B. slightly smaller

C. close to equal

D. equal

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The number of business methods patents granted is substantially smaller compared to the number
of patents applied for.

28.

Who protects system from external threats?

A. firewall

B. EDI

C. ERP

D. Script kiddies

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option A
Solution:
Firewall protects system from external threats. A firewall typically establishes a barrier between a
trusted internal network and untrusted external network, such as the Internet.

29.

The redirection of traffic from a legitimate site to an infringing site is


called _______.

A. cyber squatting

B. cyber piracy

C. meta tagging

D. key wording

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The redirection of traffic from a legitimate site to an infringing site is called cyber piracy. Piracy is
the unauthorized distribution, theft, reproduction, copying, performance, storage, sale or other use
of intellectual property (IP) protected under copyright law. It is a form of copyright infringement.

30.

Who breaks into other people's computer systems and steals and
destroys information?

A. Hackers

B. softwares

C. Hacktivists

D. Script kiddies
Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Hackers breaks into other people's computer systems and steals and destroys information. Hacking
refers to activities that seek to compromise digital devices, such as computers, smartphones,
tablets, and even entire networks.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

31.

During which period of Internet governance was Network Solutions


given a monopoly to assign and track high-level domains?

A. Government Control Period

B. Privatization

C. Self-Regulation

D. Governmental Regulation

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
During Privatization period of Internet governance was Network Solutions given a monopoly to
assign and track high-level domains.

32.

What is software that comes hidden in free downloadable software and


tracks your online movements, mines the information stored on your
computer, or uses your computer's CPU and storage for some task you
know nothing about?

A. Web log

B. Clickstream

C. Anonymous Web browsing service


D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Spyware is software that comes hidden in free downloadable software and tracks your online
movements, mines the information stored on your computer, or uses your computer's CPU and
storage for some task you know nothing about.

33.

All of the following are acts Congress has passed or attempted to pass
to protect children online except __________.

A. Video Privacy Protection Act

B. Children's Online Protection Act

C. Communications Decency Act

D. Children's Internet Protection Act

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
All of the following are acts Congress has passed or attempted to pass to protect children online
except Video Privacy Protection Act. The Video Privacy Protection Act of 1988 is United States
legislation that prevents wrongful disclosure of an individual's personally identifiable information
stemming from their rental or purchase of audiovisual material, including videotapes, DVDs and
video games.

34.

ERP stands for.

A. Enterprise resolution planning


B. Enterprise reverse planning

C. Enterprise resource planning

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
ERP stands for Enterprise resource planning. It's a business process management software that
manages and integrates a company's financials, supply chain, operations, reporting, manufacturing,
and human resource activities.

35.

Which of the following is a privacy advocacy group that is a foundation-


and business-supported group with a legislative focus?

A. Cdt.org

B. PrivacyInternational.org

C. Epic.org

D. Privacy.org

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Cdt.org is a privacy advocacy group that is a foundation- and business-supported group with a
legislative focus.

1234567891011121314
Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

36.

Which is not a component of ERP?

A. Legacy systems

B. Bolt on applications
C. Operational database

D. Cybersoft

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Cybersoft is not a component of ERP. Cybersoft is a leading provider of innovative business
software solutions, information technology and consulting services.

37.

What is the first step in a P3P-enabled transaction?

A. send Web page

B. http GET request Web page

C. Send P3P policy files

D. http GET request P3P policy files

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The first step in a P3P-enabled transaction is http GET request Web page.

38.

Which is not a function of ERP?

A. Human resource management

B. financial
C. warehousing

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Enterprise resource planning (ERP) is a method of using computer technology to link various
Functions such as accounting, inventory control, and human resources across an entire company.
However, there are certain things that we need to consider in the ERP to enhance the business
processes. All the above are functions of ERP.

39.

All of the following are types of intellectual property protection


except_______.

A. patents

B. trademarks

C. governance

D. copyrights

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
All of the following are types of intellectual property protection except governance. Governance
encompasses the system by which an organisation is controlled and operates, and the mechanisms
by which it, and its people, are held to account.

40.
What is a type of virus that spreads itself, not just from file to file, but
from computer to computer via e‐mail and other Internet traffic?

A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Worm is a type of virus that spreads itself, not just from file to file, but from computer to computer
via e‐mail and other Internet traffic. A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

41.

All of the following are challenges to online retail except ______.

A. Consumer concerns about the security of transactions

B. Consumer concerns about the privacy of personal information given to Web sites

C. Delays in delivery of goods when compared to store shopping

D. Inability to change prices nearly instantly

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
All of the following are challenges to online retail except Inability to change prices nearly instantly.

42.

What floods a Web site with so many requests for service that it slows
down or crashes?
A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Denial‐of‐service attack floods a Web site with so many requests for service that it slows down or
crashes. A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims
to render a computer or other device unavailable to its intended users by interrupting the device's
normal functioning.

43.

Which of the following is an industry strategic factor that relates to


whether new entrants face a disadvantage when attempting to enter an
industry?

A. barriers to entry

B. power of suppliers

C. power of consumers

D. industry value chain

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Barriers to entry is an industry strategic factor that relates to whether new entrants face a
disadvantage when attempting to enter an industry.

44.

What harnesses far‐flung computers together by way of the Internet or a


virtual private network to share CPU power, databases, and database
storage?

A. Computer virus

B. Worm

C. Denial‐of‐service attack

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Grid computing harnesses far-flung computers together by way of the Internet or a virtual private
network to share CPU power, databases, and database storage.

45.

Products are made to prior to orders received based on estimated


demand under a _________.

A. supply-push model

B. demand-push model

C. supply-pull model

D. demand-pull model

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
Products are made to prior to orders received based on estimated demand under a supply-push
model. A company's supply chain stretches from the factory where its products are made to the
point the products are in customer hands.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce
Section 1 Section 2 Section 3 Section 4 Section 5

46.

What consists of the identification of risks or threats, the


implementation of security measures, and the monitoring of those
measures for effectiveness?

A. Risk management

B. Risk assessment

C. Security

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Risk management consists of the identification of risks or threats, the implementation of security
measures, and the monitoring of those measures for effectiveness. Risk management is the
process of identifying, assessing and controlling threats to an organization's capital and earnings.

47.

The major impact of Internet real estate sites is in ______.

A. completing property transactions online

B. influencing offline decisions

C. reducing commissions

D. e-mail marketing to consumers

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
The major impact of Internet real estate sites is in influencing offline decisions..

48.

What is the process of evaluating IT assets, their importance to the


organization, and their susceptibility to threats, to measure the risk
exposure of these assets?

A. Risk management

B. Risk assessment

C. Security

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Risk assessment is the process of evaluating IT assets, their importance to the organization, and
their susceptibility to threats, to measure the risk exposure of these assets. A risk assessment is
the combined effort of: identifying and analyzing potential events that may negatively impact
individuals, assets, and/or the environment; and making judgments "on the tolerability of the risk on
the basis of a risk analysis" while considering influencing factors.

49.

Which of the following is the largest online travel service?

A. Travelocity

B. Orbitz
C. Priceline

D. Expedia

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Expedia is the largest online travel service. Expedia is one of the fastest growing online travel
portals in Asia, offering travellers an extensive selection of hotels, activities and travel services to
meet every budget and activities of every kind at competitive rates.

50.

What is the process of making a copy of the information stored on a


computer?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Backup is the process of making a copy of the information stored on a computer. Backup refers to
making copies of data so that the copies may be used to restore the original data after a data loss
event. Backups are extrememly important for computer management.

1234567891011121314

Read More Section(Ecommerce)


Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

51.

Which of the following is not one of the top three online career service
providers?

A. CareerBuilder

B. Monster
C. HotJobs

D. USAJobs

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
USAJobs is not one of the top three online career service providers. USAJobs is the United States
Government's website for listing civil service job opportunities with federal agencies.

52.

What software detects and removes or quarantines computer viruses?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Anti‐virus software detects and removes or quarantines computer viruses. Antivirus software is a
program or set of programs that are designed to prevent, search for, detect, and remove software
viruses, and other malicious software like worms, trojans, adware, and more.

53.

The largest segment in the recruitment business is________.

A. General job recruitment


B. Executive search

C. Specialized job placement services

D. Managerial recruitment

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The largest segment in the recruitment business is General job recruitment.

54.

What is hardware and/or software that protects computers from


intruders?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Firewall is software that protects computers from intruders. A firewall typically establishes a barrier
between a trusted internal network and untrusted external network, such as the Internet.

55.

The majority of job seekers rely on which of the following?


A. Word-of-mouth leads

B. Employment agencies

C. Internet and newspapers equally

D. Internet only

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The majority of job seekers rely on Internet and newspapers equally.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

56.

What is the use of physical characteristics — such as your fingerprint,


the blood vessels in the retina of your eye, the sound of your voice, or
perhaps even your breath — to provide identification?

A. Backup

B. Anti‐virus

C. Firewall

D. Biometrics

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Biometrics is the use of physical characteristics — such as your fingerprint, the blood vessels in the
retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification.

57.

The most popular type of media in terms of total hours of consumption


per year is _____.
A. television

B. radio

C. Internet

D. newspaper

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The most popular type of media in terms of total hours of consumption per year is television.
Though consumption of video on digital platforms is on the rise in the country, good old television
continues to score in terms of penetration and has large headroom left to fill.

58.

All of the following are considered biometrics, except:

A. Fingerprint

B. Retina

C. Password

D. Voice

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
All of the following are considered biometrics, except Password. Biometrics are more secure than
traditional passwords and PINs.

59.
Which of the following describes paid content's relation to free user-
generated content?

A. Free content jeopardizes paid content

B. Paid content jeopardizes free content

C. Free content and paid content can both work in tandem cooperatively

D. Paid content is viable now but will not be in the future

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Free content and paid content can both work in tandem cooperatively describes paid content's
relation to free user-generated content.

60.

What scrambles the contents of a file so you can't read it without having
the right decryption key?

A. Encryption

B. Intrusion‐detection software

C. Security‐auditing software

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Encryption scrambles the contents of a file so you can't read it without having the right decryption
key. Encryption is the process of encoding a message or information in such a way that only
authorized parties can access it and those who are not authorized cannot. Encryption does not
itself prevent interference, but denies the intelligible content to a would-be interceptor.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

61.
The top U.S online video site is ______.

A. MySpace

B. YouTube

C. AOL

D. Google Video

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The top U.S online video site is YouTube. The most popular video hosting website is YouTube, with
1.8 billion logged-in users per month and the most extensive catalog of online videos.

62.

What is an encryption system that uses two keys: a public key that
everyone can have and a private key for only the recipient?

A. Encryption

B. Public key encryption

C. Intrusion‐detection software

D. Security‐auditing software

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Public-key encryption is a cryptographic system that uses two keys - a public key known to
everyone and a private or secret key known only to the recipient of the message.
63.

Which of the following is not a type of media convergence?

A. technological convergence

B. content convergence

C. industry convergence

D. community convergence

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Community convergence is not a type of media convergence. Communities-Convergence means to
converge is an ancient custom; it means to reunite, to reconnect, to share, to celebrate, to
cooperate, to learn, to support, to dream and act as a single community that speaks with the same
voice and loves as one heart!

64.

What looks for people on the network who shouldn't be there or who are
acting suspiciously?

A. Encryption

B. Public key encryption

C. Intrusion‐detection software

D. Security‐auditing software

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option C
Solution:
Intrusion‐detection software looks for people on the network who shouldn't be there or who are
acting suspiciously. An intrusion detection system is a device or software application that monitors
a network or systems for malicious activity or policy violations.

65.

The online content revenue model in which free content drives offline
revenues is called the _________.

A. marketing model

B. advertising model

C. pay-per-view model

D. subscription model

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The online content revenue model in which free content drives offline revenues is called the
marketing model. Marketing mix modeling is statistical analysis such as multivariate regressions on
sales and marketing time series data to estimate the impact of various marketing tactics on sales
and then forecast the impact of future sets of tactics.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

66.

What checks out your computer or network for potential weaknesses?

A. Encryption

B. Public key encryption

C. Security‐auditing software

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option C
Solution:
Security‐auditing software checks out your computer or network for potential weaknesses. A
computer security audit is a manual or systematic measurable technical assessment of a system or
application.

67.

The combination of technical and legal means for protecting digital


content from unlimited reproduction without permission is known as
__________.

A. Digital rights management

B. Digital protection schemes

C. Digital distribution regulation

D. Digital rights protection

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The combination of technical and legal means for protecting digital content from unlimited
reproduction without permission is known as Digital rights management. Digital rights management
(DRM) is a systematic approach to copyright protection for digital media.

68.

Which of the following to viruses harm?

A. Your keyboard

B. Your monitor

C. Your processor

D. Viruses do not harm any of the above


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer by damaging programs, deleting
files, or reformatting the hard drive.

69.

What is the most commonly offered interactive feature of newspaper


Web sites?

A. video

B. comments on blogs

C. RSS feeds

D. podcasts

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
RSS feeds is the most commonly offered interactive feature of newspaper Web sites. RSS (Really
Simple Syndication) and Atom are two specialized formats that create what's commonly called a
news feed, or just feed. A feed is an easy way for sites to share headlines and stories so that you
can read them without having to visit two dozen different web pages everyday.

70.

Which of the following can a virus do?

A. Hurt your hardware

B. Hurt any files they weren't designed to attack


C. Infect files on write‐protected disks

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Some computer viruses are programmed to harm your computer by damaging programs, deleting
files, or reformatting the hard drive.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 4
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Section4

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

1.

Which of the following is an advantage of e-books?

A. reduced transaction costs for the user

B. requirement of expensive devices to use

C. portability compared to print books

D. copyright management

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Reduced transaction costs for the user is an advantage of e-books. An electronic book, also known
as an e-book or eBook, is a book publication made available in digital form, consisting of text,
images, or both, readable on the flat-panel display of computers or other electronic devices.

2.

In simple terms, what does risk assessment ask?

A. What can go wrong?

B. How likely is it to go wrong?

C. What are the possible consequences if it does go wrong?


D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
In simple terms, risk assessment can ask What can go wrong? How likely is it to go wrong? and
What are the possible consequences if it does go wrong?

3.

After television, the next largest major player in the commercial


entertainment industry is _________.

A. video games

B. music

C. radio

D. film

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
After television, the next largest major player in the commercial entertainment industry is film.

4.

Which of the following is a characteristic of a firewall?

A. Examines each message as it seeks entrance to the network

B. Blocks messages without the correct markings from entering the network
C. Detects computers communicating with the Internet without approval

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The characteristic of a firewall Examines each message as it seeks entrance to the network, Blocks
messages without the correct markings from entering the network and Detects computers
communicating with the Internet without approval.

5.

Which of the following is not an entertainment industry value chain


model?

A. content owner direct model

B. user distribution model

C. aggregator model

D. Internet innovator model

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
User distribution model is not an entertainment industry value chain model. Distribution model
defines which applications in your distributed systems communicate with each other and which
types of data are distributed.

1234567891011121314

Read More Section(Ecommerce)


Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

6.

Which of the following are ways to prove access rights?

A. What you know, like a password

B. What you have, like an ATM card

C. What you look like


D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
What you know, like a password, What you have, like an ATM card and What you look like all are
ways to prove access rights.

7.

Technologies that help enhance resolution of e-book reader display


screens are known as _________.

A. high-res pixel formatting

B. screen resolution technologies

C. sub-screen smoothing technologies

D. sub-pixel display technologies

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Technologies that help enhance resolution of e-book reader display screens are known as sub-pixel
display technologies. Subpixel rendering is a way to increase the apparent resolution of a
computer's liquid crystal display (LCD) or organic light-emitting diode (OLED) display by rendering
pixels to take into account the screen type's physical properties.

8.

Which item can a password be used to protect?

A. Network
B. File

C. Folder

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Network, File and Folder can be protected by using a password.

9.

All of the following are characteristics of a social network except


_______.

A. involves a group of people

B. features shared social interaction

C. always feature shared goals and purposes

D. common ties among members

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
All of the following are characteristics of a social network except always feature shared goals and
purposes.

10.

Which is the most important component of IT?


A. Information

B. People

C. Information technology

D. Computers

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
People is the most important component of IT. Their human-resource systems shine! People play a
vital role in most operational systems and processes. Knowledge, skills and attitudes often
determine the quality and quantity of system output.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

11.

Social networking sites primarily earn their revenue through _________.

A. advertising

B. subscriptions

C. donations

D. service fees

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Social networking sites primarily earn their revenue through advertising. The most common way for
websites to generate revenue is to allow companies to advertise on the site. Web advertising is still
an emerging market.

12.

Which of the following applies to the implementation of an idea?

A. Copyright
B. Intellectual property

C. Patent

D. Denial‐of‐service attack

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Patent applies to the implementation of an idea.

13.

The type of social network described as a community built around a


common interest such as games, sports, music, and so on is called
_________.

A. general community

B. practice network

C. affinity community

D. interest-based social network

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The type of social network described as a community built around a common interest such as
games, sports, music, and so on is called interest-based social network. An interest-based network
is exactly what it sounds like: a social network built around interests, using common threads to
bring members of an audience together. Whether for travel, food, fashion or cats, interest-based
networks are taking over the social media scene, and brands that get it stand to reap the benefits.
14.

When you purchase copyrighted software, what actually are you paying
for?

A. The cost of the CDs, manuals, and development of the software

B. The cost of the CDs, manuals, and a share of the cost of the software development

C. A share of the cost of software development

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
When we purchase copyrighted software, we are actually paying for The cost of the CDs, manuals,
and development of the software, The cost of the CDs, manuals, and a share of the cost of the
software development and A share of the cost of software development.

15.

Auction sites like eBay tend to use _______ pricing.

A. dynamic

B. fixed

C. trigger

D. utilization

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option A
Solution:
Auction sites like eBay tend to use dynamic pricing. Dynamic pricing is the latest pricing trend that
has taken the ecommerce industry by storm.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

16.
Which of the following is not a dimension of privacy?

A. Need for personal space

B. Need to feel in control of our possessions

C. Need to feel in control of our personal information

D. All of the above are dimensions of privacy

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Need for personal space, Need to feel in control of our possessions and Need to feel in control of
our personal information all are dimension of privacy.

17.

Which of the following is not considered to be a drawback of Internet


auctions?

A. market inefficiency

B. trust risks

C. fulfillment costs

D. delayed consumption costs

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Market inefficiency is not considered to be a drawback of Internet auctions. A market anomaly (or
market inefficiency) in a financial market is a price and/or rate of return distortion that seems to
contradict the efficient-market hypothesis.

18.

Which of the following captures screen images?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen capture software

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Screen capture software captures screen images. Screen recording software lets you capture your
screen to share with others, in support tickets, product videos, onboarding training, and more.

19.

The marketplace for auction sites is best described as __________.

A. many sites attaining similar levels of profitability

B. easy to enter due to minimal barriers

C. populated mostly with small, thriving specialty sites

D. dominated by a handful of sites with established networks

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
Solution:
The marketplace for auction sites is best described as dominated by a handful of sites with
established networks.

20.

Which of the following examines information passing through switches,


hubs, or routers?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Packet sniffer examines information passing through switches, hubs and routers. Packet sniffing is
the act of capturing packets of data flowing across a computer network. The software or device
used to do this is called a packet sniffer.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

21.

A dynamically priced market that features few buyers and many sellers
is a market that exhibits ______.

A. market neutrality

B. buyer bias

C. seller bias

D. owner bias

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A dynamically priced market that features few buyers and many sellers is a market that exhibits
buyer bias.

22.

Which of the following records logons and deletions?

A. Key logger

B. Packet sniffer

C. Log analysis tools

D. Screen captures

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Log analysis tools records logons and deletions. Log analysis helps us in understanding what has
happened and derive useful metrics in monitoring, performance, digital marketing etc.

23.

The most popular type of auction on eBay is the _________.

A. Dutch Internet auction

B. Name Your Own Price auction

C. English auction

D. Professional service auction

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option C
Solution:
The most popular type of auction on eBay is the English auction. English auction, also known as an
open ascending price auction. This type of auction is arguably the most common form of auction in
use today.

24.

E‐mail messages may be stored on which of the following computers?

A. Sender's computer

B. Sender's server

C. Recipient's server

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
E‐mail messages may be stored on Sender's computer, Sender's server and Recipient's server.

25.

Which of the following is not a primary function of a portal?

A. navigation of the Web

B. social networking

C. commerce

D. content

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option B
Solution:
Social networking is not a primary function of a portal. Social networking is the use of Internet-
based social media sites to stay connected with friends, family, colleagues, customers, or clients.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

26.
What might identity thieves do with your identity?

A. Apply for and use credit cards

B. Apply for a loan

C. Change their identity

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Once identity thieves have your personal information, they can drain your bank account, run up
charges on your credit cards, open new utility accounts, or get medical treatment on your health
insurance. An identity thief can file a tax refund in your name and get your refund.

27.

Which portal business model best describes Yahoo?

A. general purpose portal

B. affinity group based vertical market

C. focused content based vertical market

D. none of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
General purpose portal business model best describes Yahoo. Yahoo! is an Internet portal that
incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of
topic categories.
28.

Which of the following is not a common approach to phishing?

A. Send an official‐looking e‐mail asking for confidential information

B. Ask people to fill out and return a fake letter using postal mail

C. Ask people to click a link in an e‐mail to open a submission form on a web page

D. All of the above are uncommon approaches to phishing

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Asking people to fill out and return a fake letter using postal mail is not a common approach to
phishing.

29.

Which of the following portal revenue models involves charging for


premium content?

A. ISP services

B. General advertising

C. Subscription fees

D. Tenancy deals

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Subscription fees portal revenue models involves charging for premium content.

30.

A technique used to gain personal information for the purpose of


identity theft, often by e‐mail, is called?

A. Phishing

B. Carding

C. Brand spoofing

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is
called Phishing, Carding and Brand spoofing.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

31.

Which of the following best describes predicted growth in C2C and B2C
auction spending?

A. B2C spending will overtake C2C spending

B. Both types of spending will increase

C. C2C spending will decrease while B2C increases

D. Both types of spending will decline at similar rates

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Both types of spending will increase best describes predicted growth in C2C and B2C auction
spending.
32.

Companies can gather information about employees and potential


employees from which of the following places?

A. Job applications

B. Credit reports

C. Companies that track Web surfers

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Companies can gather information about employees and potential employees from Job
applications, Credit reports and Companies that track Web surfers.

33.

An auction that has multiple winners that all pay the same price is an
example of________.

A. uniform pricing

B. discriminatory pricing

C. bid rigging

D. price matching

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option A
Solution:
An auction that has multiple winners that all pay the same price is an example of uniform pricing. It
is also called "simple monopoly pricing". The buyers are free to choose the quantity at a fixed price.

34.

Cyber slacking consists of what activities?

A. Visiting “inappropriate” web sites

B. Visiting news sites

C. Chatting online with others about non‐work topics

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Cyber slacking consists of Visiting “inappropriate” web sites, Visiting news sites and Chatting online
with others about non‐work topics.

35.

The communication standard for sharing business documents and


settlement information that emerged in the 1970s is called__________.

A. ECD

B. EDI

C. IDE

D. BCB

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
The communication standard for sharing business documents and settlement information that
emerged in the 1970s is called EDI. Electronic data interchange is the concept of businesses
electronically communicating information that was traditionally communicated on paper, such as
purchase orders and invoices.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

36.

Cookies are used to do which of the following?

A. Store your ID and password for subsequent logons to the site

B. Store contents of electronic shopping carts

C. To track web activity

D. All of the above and more

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Cookies are used to Store your ID and password for subsequent logons to the site, Store contents
of electronic shopping carts and To track web activity.

37.

All of the following are potential benefits of B2B e-commerce


except_________.

A. reduced amount of 'first-mover' advantages

B. decreased product cycle time

C. increased opportunities for collaborating with suppliers and distributors

D. increased production flexibility

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option A
Solution:
All of the following are potential benefits of B2B e-commerce except reduced amount of 'first-mover'
advantages.

38.

Unsolicited e‐mail is called what?

A. Junk mail

B. Spam

C. Extra mail

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Unsolicited e‐mail is called Spam. Spam is electronic junk mail or junk newsgroup postings. Some
people define spam even more generally as any unsolicited email. However, if a long-lost brother
finds your email address and sends you a message, this could hardly be called spam, even though
it is unsolicited.

39.

Goods directly involved in the production process are known as


_________.

A. MRO goods

B. procured goods

C. indirect goods
D. direct goods

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Goods directly involved in the production process are known as direct goods. Direct goods and
services are purchases that are directly related to the production of the particular good or service
that is being offered.

40.

What is the name of the new anti‐Spam bill?

A. No‐Spam

B. CAN‐Spam

C. Spam‐Away

D. Stop Spam

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
CAN‐Spam is the name of the new anti‐Spam bill. Controlling the Assault of Non-Solicited
Pornography And Marketing (CAN-SPAM) is a law that establishes the rules for commercial email
and commercial messages, gives recipients the right to have a business stop emailing them, and
outlines the penalties incurred for those who violate the law.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

41.

A materials requirements planning (MRP) system is an example of


______.

A. spot purchasing

B. a multi-tier supply chain


C. a legacy computer system

D. electronic data interchange

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
A materials requirements planning (MRP) system is an example of a legacy computer system.
Material requirements planning (MRP) is a system for calculating the materials and components
needed to manufacture a product. It consists of three primary steps: taking inventory of the
materials and components on hand, identifying which additional ones are needed and then
scheduling their production or purchase.

42.

What is the legal protection afforded an expression of an idea, such as


a song, video game, and some types of proprietary documents?

A. Ethics

B. Intellectual property

C. Copyright

D. Fair Use Doctrine

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Copyright is the legal protection afforded an expression of an idea, such as a song, video game,
and some types of proprietary documents. Copyright refers to the legal right of the owner of
intellectual property. In simpler terms, copyright is the right to copy.

43.
The foundation for contemporary supply chain management systems
includes all of the following except _________.

A. supply chain simplification

B. continuous inventory replenishment

C. ERP systems

D. B2B electronic storefronts

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The foundation for contemporary supply chain management systems includes all of the following
except B2B electronic storefronts.

44.

What is the unauthorized use, duplication, distribution or sale of


copyrighted software?

A. Fair Use Doctrine

B. Pirated software

C. Counterfeit software

D. Privacy

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Pirated software is the unauthorized use, duplication, distribution or sale of copyrighted software.
Software piracy is the illegal copying, distribution, or use of software.

45.

The two main types of Internet-based B2B commerce are_________.

A. Net marketplaces and private industrial networks

B. EDI and collaborative commerce

C. Net marketplaces and collaborative commerce

D. EDI and private industrial networks

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The two main types of Internet-based B2B commerce are EDI and private industrial networks.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

46.

What is a program, when installed on a computer, records every


keystroke and mouse click?

A. Key logger software

B. Hardware key logger

C. Cookie

D. Adware

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Key logger software is a program, when installed on a computer, records every keystroke and
mouse click. A keylogger can be either a piece of software or a small hardware device that is used
to capture the keystrokes that are typed on the keyboard.

47.

The type of Net marketplace characterized by indirect inputs and spot


purchasing is called an _______.

A. industry consortium

B. independent exchange

C. e-distributor

D. e-procurement marketplace

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The type of Net marketplace characterized by indirect inputs and spot purchasing is called an e-
distributor. E-distribution is a type of distribution that uses purely electronic media. It is often
interpreted as the buying or selling of services or goods over a public network without the physical
media; this is usually done by downloading from the Internet to the consumer's electronic device.

48.

What is software you don't want hidden inside a software?

A. Adware

B. Trojan‐horse software

C. Spyware

D. All of the above

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option D
Solution:
Adware, Trojan‐horse software and Spyware is software we don't want hidden inside a software.

49.

The most common and easily understood type of Net marketplace is


______.

A. e-procurement marketplace

B. e-distributors

C. industry consortia

D. independent exchanges

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The most common and easily understood type of Net marketplace is e-distributors. is a type of
distribution that uses purely electronic media. It is often interpreted as the buying or selling of
services or goods over a public network without the physical media; this is usually done by
downloading from the Internet to the consumer's electronic device.

50.

What is an electronic representation of cash?

A. Digital cash

B. Electronic cash

C. E‐cash
D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Digital cash, Electronic cash and E‐cash is an electronic representation of cash.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

51.

All of the following are objectives of private industrial networks except


________.

A. developing efficient purchasing and selling business processes industry-wide

B. operating on a local scale

C. creating increased supply chain visibility

D. reducing industry risk

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
All of the following are objectives of private industrial networks except operating on a local scale.

52.

What is a fully‐equipped computer that you wear as a piece of clothing


or attached to a piece of clothing similar to the way you would carry
your cell phone on your belt?

A. Wearable computer

B. GPS

C. Implant chip

D. None of the above


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Wearable computer is a fully‐equipped computer that you wear as a piece of clothing or attached to
a piece of clothing similar to the way you would carry your cell phone on your belt.

53.

Which of the following is not one of the benefits of e-commerce to


sellers?

A. E-commerce offers greater flexibility in meeting customer needs

B. E-commerce is a powerful tool for customer relationship building

C. E-commerce can help to reduce costs

D. E-commerce increases the net cost per contact

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
E-commerce increases the net cost per contact is not one of the benefits of e-commerce to sellers.

54.

What is a technology‐enabled microchip implanted into the human


body?

A. Wearable computer

B. GPS

C. Implant chip
D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Implant chip is a technology‐enabled microchip implanted into the human body. A human microchip
implant is typically an identifying integrated circuit device or RFID transponder encased in silicate
glass and implanted in the body of a human being.

55.

The E-commerce domain that involves business activity initiated by the


consumer and targeted to businesses is known as ________.

A. Business to Business (B2B)

B. Consumer to Consumer (C2C)

C. Consumer to Business (C2B)

D. Business to Consumer (B2C)

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The E-commerce domain that involves business activity initiated by the consumer and targeted to
businesses is known as Consumer to Business (C2B). Consumer-to-business (C2B) is a business
model in which consumers (individuals) create value and businesses consume that value.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

56.

Which of the following is not a reason why digital cash has turned out
to be extremely difficult?

A. If your system crashes you lose your money

B. There is only one standard

C. Digital cash makes money laundering easy


D. Digital cash travels across the vast Internet and is susceptible to begin stolen

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
There is only one standard is not a reason why digital cash has turned out to be extremely difficult.

57.

A _________ is a B2B trading network that links a particular seller with


its own trading partners.

A. bitstream

B. virtual network

C. web community

D. private trading network

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
A private trading network is a B2B trading network that links a particular seller with its own trading
partners. Private e-marketplaces, also known as private trading networks, are particularly well
suited for manufacturing organizations such as Cisco's that: Cisco's eHub Initiative.

58.

Smart card is better protected than other cards using.

A. Encryption

B. Firewall
C. Hub

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Smart card is better protected than other cards using Encryption. Encryption is the process of
encoding a message or information in such a way that only authorized parties can access it and
those who are not authorized cannot.

59.

The type of website that is designed to build customer goodwill and to


supplement other sales channels rather then sell the company's
products directly is known as a ______________ website.

A. marketing

B. click-and-mortar

C. customer service

D. corporate

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The type of website that is designed to build customer goodwill and to supplement other sales
channels rather then sell the company's products directly is known as a corporate website. The
purpose of these sites is to provide information about the company and its products or services.

60.

Trust card is introduced by.


A. BSNL and itzcash

B. BSNL and oxicash

C. BSNL only

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Trust card is introduced by BSNL and itzcash. Trust Card is a multipurpose prepaid payment card
brought to you by BSNL in association with ItzCash. With this card you can make payments for your
BSNL Bills (Postpaid bills & Prepaid top-ups), purchase BSNL Value Added Services viz.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

61.

______________ marketing is the Internet version of word-of-mouth


marketing.

A. Visceral

B. Virile

C. Viral

D. Virtual

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Viral marketing is the Internet version of word-of-mouth marketing. Viral Marketing is that which is
able to generate interest and the potential sale of a brand or product through messages that spread
like a virus, in other words, quickly, and from person to person. The idea is for it to be the users
themselves that choose to share the content.

62.

PaisaPay is offered only by.


A. Homeshop18.com

B. eBay.in

C. amazon.com

D. none

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
PaisaPay is offered only by eBay.in. An eBay India owned, safe & secured payment service;
PaisaPay enables Buyers to pay for their purchases using Credit Card, Debit Card, Online Bank
Transfer or Cash on Delivery.

63.

Why would a merchant want to customize products?

A. To charge a higher price

B. To decrease costs

C. It is required in EC

D. Customers will only accept customized products

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A merchant want to customize products because to charge a higher price.

64.
The E‐payment mechanism widely used in B2B is.

A. Credit card

B. Debit card

C. Master card

D. E‐cheque

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The E‐payment mechanism widely used in B2B is E‐cheque. An electronic version or
representation of a paper cheque. The account holder writes an e-check (or e-cheque) using a
computer or other type of electronic device and transmits the e-cheque to the payee electronically.
Like paper cheques, e-checks are signed by the payer and endorsed by the payee.

65.

A website offering content created by third party transparently to


customers is an example of ________.

A. Reintermediation

B. Syndication

C. Virtual Manufacturing

D. Build-to-order

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A website offering content created by third party transparently to customers is an example of
Syndication. a group of individuals or organizations combined or making a joint effort to undertake
some specific duty or carry out specific transactions or negotiations.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

66.
Which type of technology will increase portability and mobility?

A. Implant chips

B. Micro‐payments

C. Internet phone calls

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Implant chips, Micro‐payments and Internet phone calls type of technology will increase portability
and mobility.

67.

Which of the following an accurate statement about internet phone


calls?

A. They are possible but not yet free

B. They are not possible

C. They are currently standard practice

D. None of the above is an accurate statement about internet phone calls

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
An accurate statement about internet phone calls is that they are possible but not yet free.
68.

What are the most commonly used input devices today?

A. Keyboard

B. Mouse

C. All of the above

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Keyboard and Mouse are the most commonly used input devices today.

69.

Which of the following can be used to help identify people in a crowd?

A. Biochip

B. Implant chip

C. Facial recognition software

D. Vision chip

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Facial recognition software can be used to help identify people in a crowd. A facial recognition
system is a technology capable of identifying or verifying a person from a digital image or a video
frame from a video source.

70.

Which one is also known as plastic money?

A. Credit card

B. Debit card

C. Paper cash

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Credit card is also known as plastic money. Credit Card is a small plastic card that is issued by
financial institutions such as banks. As the name Credit when one buys using credit card, one is
buying by taking loan.

1234567891011121314

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 5
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Section5

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

1.

E‐cheques are …………

A. Prepaid

B. Postpaid

C. Both prepaid and postpaid

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
E‐cheques are Prepaid. E-cheques are a mode of electronic payments.
2.

Digital signature is a.

A. Digital id,send as an attachment to a web page/e‐mail/message

B. Is used for verifying the attachments send using web

C. Both a and b

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Digital signature is a Digital id,send as an attachment to a web page/e‐mail/message and it is used
for verifying the attachments send using web. A digital signature is a mathematical technique used
to validate the authenticity and integrity of a message, software or digital document.

3.

Which one is the component of cybercash payment system?

A. CC user software

B. CC merachant software

C. CC Server Software

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
CC user software, CC merachant software and CC Server Software are the component of
cybercash payment system.

4.

The presence of ‐‐‐‐‐‐‐‐‐‐‐ make the smart card smart.

A. Memory

B. Microchip

C. E‐cash

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The presence of Microchip make the smart card smart.

5.

The smart card which use antenna for reading and writing data.

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The smart card which use antenna for reading and writing data are Contactless smart card and
Proximity smart card.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

6.
‐‐‐‐‐‐‐‐‐ card is read only mode.

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Proximity smart card is read only mode. A proximity card or prox card is a "contactless" smart card
which can be read without inserting it into a reader device, as required by earlier magnetic stripe
cards such as credit cards and "contact" type smart cards.

7.

Which of the smart card uses a sim like structure for reading and
writing data?

A. Contact smart card

B. Contactless smart card

C. Proximity smart card

D. Both B and C

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Contact smart card uses a sim like structure for reading and writing data. This type of smart card
consists of electrical contacts which are used to connect to the card reader where the card is
inserted. The electrical contacts are deployed on a conductive gold plated coating on the card
surface.

8.

Which is not a feature of eCommerce?

A. SCM

B. EDI

C. WWW

D. BPR

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
BPR is not a feature of eCommerce. Business process re-engineering is a business management
strategy, originally pioneered in the early 1990s, focusing on the analysis and design of workflows
and business processes within an organization.

9.

What is I stands in CIA of smart card?

A. International

B. Integrity

C. Identity

D. None of the above

Answer & Solution Discuss in Board Save for Later


Answer & Solution

Answer: Option B
Solution:
I stands for Integrity in CIA of smart card. CIA stands for confidentiality, integrity and availability,
which are said to be the three most important elements of reliable security.

10.

What is A stands in CIA of smart card?

A. auditing

B. authenticity

C. authorized

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
A stands for authenticity in CIA of smart card.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

11.

What is C stands in CIA of smart card?

A. confidentiality

B. conference

C. congress

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
C stands for confidentiality in CIA of smart card.

12.

Which one is the third party payment providers who offer digital wallets
for E‐merchants?

A. Oxicash

B. PayMate

C. PayPass

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Oxicash, PayMate and PayPass is the third party payment providers who offer digital wallets for E‐
merchants.

13.

Which is used to identify mobile money?

A. MCID

B. MMID

C. RSID

D. NONE OF THE ABOVE

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option B
Solution:
MMID is used to identify mobile money. Mobile Money Identifier (MMID) is a seven-digit number,
issued by banks for effecting financial transactions through the user's mobile phone.

14.

‐‐‐‐‐‐‐‐‐ is an act that poses danger to computer assets.

A. Threat

B. Danger

C. Error

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Threat is an act that poses danger to computer assets.

15.

Which one is not a encryption technique?

A. RSA

B. DES

C. AES

D. NONE OF THE ABOVE

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
Solution:
RSA, DES and AES all are an encryption technique.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

16.
Which one is not used as a security mechanism?

A. Encryption

B. Cryptography

C. Wallets

D. Digital signature

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Wallets is not used as a security mechanism. All the others are used.

17.

Which e‐government arena is being used when governmental agencies


send out and accept bids for work?

A. G2G

B. G2B

C. G2C

D. G2G

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
G2B e‐government arena is being used when governmental agencies send out and accept bids for
work. In this type of interaction, e-Governance tools are used to help the business organizations
that provide goods and services to seamlessly interact with the government.
18.

Secret key is used for.

A. Public key cryptography

B. Private key cryptography

C. Asymmetric key cryptography

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Secret key is used for Private key cryptography. A private key, also known as a secret key, is a
variable in cryptography that is used with an algorithm to encrypt and decrypt code. Secret keys are
only shared with the key's generator, making it highly secure. Private keys play an important role in
symmetric cryptography, asymmetric cryptography and cryptocurrencies.

19.

Which one is communication channel threat?

A. Sniffer programs

B. Cyber vandalism

C. Integrity threats

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Sniffer programs, Cyber vandalism and Integrity threats are communication channel threat.

20.

Which one is communication channel security protocol?

A. SSL

B. S‐HTTP

C. SET

D. ALL OF THE ABOVE

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
SSL, S‐HTTP and SET are communication channel security protocol.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us
Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

21.

The protocol which allows the file transfer between computers is.

A. TCP/IP

B. FTP

C. HTTP

D. SOA

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The protocol which allows the file transfer between computers is FTP. The File Transfer Protocol
(FTP) is a standard network protocol used for the transfer of computer files between a client and
server on a computer network.
22.

E‐Banking is also known as.

A. ATMs

B. Net banking

C. Traditional banking

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
E‐Banking is also known as Net banking. Electronic banking has many names like e banking, virtual
banking, online banking, or internet banking. It is simply the use of electronic and
telecommunications network for delivering various banking products and services. Through e-
banking, a customer can access his account and conduct many transactions using his computer or
mobile phone. In this article, we will look at the importance and types of e-banking services.

23.

__________ is backbone of all E‐payments in E‐commerce.

A. EFT

B. EPS

C. PayPal

D. None of these

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option B
Solution:
EPS is backbone of all E‐payments in E‐commerce. An e-payment system is a way of making
transactions or paying for goods and services through an electronic medium, without the use of
checks or cash. It’s also called an electronic payment system or online payment system.

24.

Which one is a client level threat?

A. Malicious code

B. Viruses

C. Active contents

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Malicious code, Viruses and Active contents are client level threat.

25.

Which one is not an encryption technique?

A. RSA

B. DES

C. AES

D. FTP

Answer & Solution Discuss in Board Save for Later

Answer & Solution


Answer: Option D
Solution:
FTP is not an encryption technique. The File Transfer Protocol is a standard network protocol used
for the transfer of computer files between a client and server on a computer network.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

26.
Which one is an encryption technique?

A. RSA

B. DES

C. AES

D. All of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
RSA, DES and AES are encryption technique.

27.

Which one is not a server level threat?

A. Malicious code

B. CGI threats

C. Database threats

D. Buffer overflows

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Malicious code is not a server level threat. Malicious code is the term used to describe any code in
any part of a software system or script that is intended to cause undesired effects, security
breaches or damage to a system. Malicious code is an application security threat that cannot be
efficiently controlled by conventional antivirus software alone.
28.

Which one is not a physical threat?

A. Hacking

B. Storm

C. Phishing

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Hacking is not a physical threat. Hacking generally refers to unauthorized intrusion into a computer
or a network.

29.

Which one is a physical threat?

A. Phishing

B. Storm

C. Earthquake

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Phishing, Storm and Earthquake all are physical threat.
30.

The basic elements of website is.

A. Home page

B. Web pages

C. Links and banners

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The basic elements of website is Home page, Web pages and Links and banners.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

31.

Which one is threat for E‐commerce?

A. Trojan horse

B. firewall

C. encryption

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Trojan horse is threat for E‐commerce. A Trojan horse or Trojan is a type of malware that is often
disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to
gain access to users' systems. Users are typically tricked by some form of social engineering into
loading and executing Trojans on their systems.

32.

Secure communication means.


A. Protect transmission of credit card number

B. Guarantee privacy of customer

C. Unauthorized access of payment details

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Secure communication means Protect transmission of credit card number, Guarantee privacy of
customer and Unauthorized access of payment details.

33.

Which one is not an offline payment mode?

A. Cash on delivery

B. Cash before delivery

C. Demand drafts

D. e‐cheque

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
E‐cheque is not an offline payment mode. An eCheque is a payment that you make directly from
your bank account. You can only send an eCheque if your bank account is the only payment
method attached to your bank account, and you don't have a credit or debit card as a back-up
payment method.

34.
Which one is an offline payment mode?

A. Cash on delivery

B. Cash before delivery

C. Credit card

D. Both a and b

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Both Cash on delivery and Cash before delivery are offline payment mode.

35.

Which one is not an online payment mode?

A. Cash on delivery

B. Debit card

C. Credit card

D. e‐cheque

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
Cash on delivery is not an online payment mode. It is an offline payment mode.

12345678910
Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

36.

which one is not an E‐payment method used in India?

A. Debit card

B. Credit card
C. e‐cheque

D. none

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Debit card, Credit card and e‐cheque all are E‐payment method used in India.

37.

OTP stands for.

A. One Time Password

B. On Time processing

C. One time processor

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
A one-time password (OTP), also known as one-time pin or dynamic password, is a password that
is valid for only one login session or transaction, on a computer system or other digital device.

38.

Which one is not a threat for E‐commerce?

A. Trojan horse

B. Viruses
C. Worm

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Trojan horse, Viruses and Worm all are threat for E‐commerce.

39.

Private Key cryptography is also known as __________ cryptography.

A. Public key

B. Symmetric

C. Asymmetric

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
Private Key cryptography is also known as Symmetric cryptography. A private key is a tiny bit of
code that is paired with a public key to set off algorithms for text encryption and decryption. It is
created as part of public key cryptography during asymmetric-key encryption and used to decrypt
and transform a message to a readable format.

40.

Public key cryptography is also known as _________ cryptography.

A. Private key
B. Symmetric

C. Asymmetric

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Public key cryptography is also known as Asymmetric cryptography. Asymmetric cryptography, also
known as public key cryptography, uses public and private keys to encrypt and decrypt data. The
keys are simply large numbers that have been paired together but are not identical (asymmetric).
One key in the pair can be shared with everyone; it is called the public key.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

41.

What is an arrangement made between e‐commerce sites that direct


users from one site to the other?

A. Spam

B. Viral marketing

C. Affiliate programs

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
Affiliate programs is an arrangement made between e‐commerce sites that direct users from one
site to the other.

42.

Which one is not layer of E‐commerce infrastructure?

A. Physical layer

B. Product layer
C. Service layer

D. None

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Physical layer, Product layer and Service layer all are layer of E‐commerce infrastructure.

43.

Which will harm computer resources

A. Worm

B. Virus

C. Trojan horse

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
Worm, Virus and Trojan horse will harm computer resources.

44.

The study of encryption is called ___________.

A. Decryption

B. Cryptography
C. Firewall

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option B
Solution:
The study of encryption is called Cryptography. Cryptography is associated with the process of
converting ordinary plain text into unintelligible text and vice-versa.

45.

During E‐commerce transaction we should ensure ___________.

A. Integrity

B. Security

C. Confidentiality

D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
During E‐commerce transaction we should ensure Integrity, Security and Confidentiality.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

Login
 Home
 Aptitude
 English
 Reasoning
 DI
 GK
 Current Affairs
 Interview
 Computer
 Programming
 Engineering
 More
 Ask Question
eCommerce MCQ Questions and Solutions with Explanations |
Commerce
Home / Commerce / Ecommerce

Section 1 Section 2 Section 3 Section 4 Section 5

46.

The virus that are commonly found in word documents are called
__________.

A. Macro

B. Trojan horse

C. Script virus

D. None of the above


Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option A
Solution:
The virus that are commonly found in word documents are called Macro. A macro virus is a
computer virus written in the same macro language used for software programs, including Microsoft
Excel or word processors such as Microsoft Word.

47.

The virus that are attached with vb and java files are called.

A. Macro

B. Trojan horse

C. Script virus

D. None of the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option C
Solution:
The virus that are attached with vb and java files are called Script virus. A Script Virus is spread via
webpages and has several properties such as being easy to program, malicious, and highly
infectious. Even if you are a rookie programmer you can create a new type of Script Virus in a short
time.

48.

The viruses spreads through __________.

A. Mails

B. Pen drives and cds

C. Websites
D. All the above

Answer & Solution Discuss in Board Save for Later

Answer & Solution

Answer: Option D
Solution:
The viruses spreads through Mails, Pen drives and cds and Websites.

12345678910

Read More Section(Ecommerce)

Each Section contains maximum 70 questions. To get more questions visit other sections.
 Ecommerce - Section 1
 Ecommerce - Section 2
 Ecommerce - Section 3
 Ecommerce - Section 4
Copyright © 2019 Examveda.com



 About Us |
 Terms & Condition |
 Privacy Policy |
 Contact Us

You might also like